A cross-site scripting (XSS) flaw in the web-based control panel used by operators of the StealC info-stealing malware ...
Researchers detailed how Intellexa, Predator's owner, uses failed deployments to strengthen its commercial spyware and ...
Discover how crypto malware operates through cryptojacking and ransomware, with real-world examples such as WannaMine and PowerGhost ...
A Chinese-linked cyberespionage group targeted U.S. government and policy-related officials with Venezuela-themed phishing ...
Securonix has published a blog giving details of a new multi-stage Windows malware campaign it calls SHADOW#REACTOR. Its goal is to deploy the Remcos RAT ...
Abstract "Double-extortion" ransomware attacks not only encrypt systems but also steal sensitive data. Traditional backups ...